Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2013, Article ID 786587, 5 pages
http://dx.doi.org/10.1155/2013/786587
Research Article

An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme

School of Mathematics and Statistics, Chongqing Three Gorges University, Wanzhou, Chongqing 404000, China

Received 8 May 2013; Revised 26 August 2013; Accepted 30 August 2013

Academic Editor: Dharma Agrawal

Copyright © 2013 Juan Qu and Li-min Zou. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. X. Wang, W. Zhang, J. Zhang, and M. K. Khan, “Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards,” Computer Standards and Interfaces, vol. 29, no. 5, pp. 507–512, 2007. View at Publisher · View at Google Scholar · View at Scopus
  2. H. Hsiang and W. Shih, “Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards,” Computer Communications, vol. 32, no. 4, pp. 649–652, 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. M. Hwang and L. Li, “A new remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28–30, 2000. View at Publisher · View at Google Scholar · View at Scopus
  4. W. Ku and S. Chang, “Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards,” IEICE Transactions on Communications, vol. E88-B, no. 5, pp. 2165–2167, 2005. View at Publisher · View at Google Scholar · View at Scopus
  5. H.-R. Tseng, R.-H. Jan, and W. Yang, “A bilateral remote user authentication scheme that preserves user anonymity,” Security and Communication Networks, vol. 1, no. 4, pp. 301–308, 2008. View at Google Scholar
  6. W. Yang and S. Shieh, “Password authentication schemes with smart cards,” Computers and Security, vol. 18, no. 8, pp. 727–733, 1999. View at Publisher · View at Google Scholar · View at Scopus
  7. X. Li, J. Niu, J. Ma, W. Wang, and C. Liu, “Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 73–79, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. M. L. Das, A. Saxena, and V. P. Gulati, “A dynamic ID-based remote user authentication scheme,” IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 629–631, 2004. View at Publisher · View at Google Scholar · View at Scopus
  9. Y. Wang, J. Liu, F. Xiao, and J. Dan, “A more efficient and secure dynamic ID-based remote user authentication scheme,” Computer Communications, vol. 32, no. 4, pp. 583–585, 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Tsai, T. Wu, and K. Tsai, “New dynamic ID authentication scheme using smart cards,” International Journal of Communication Systems, vol. 23, no. 12, pp. 1449–1462, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. K. Yeh, C. Su, N. W. Lo, Y. Li, and Y. Hung, “Two robust remote user authentication protocols using smart cards,” Journal of Systems and Software, vol. 83, no. 12, pp. 2556–2565, 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. M. K. Khan, S. Kim, and K. Alghathbar, “Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme',” Computer Communications, vol. 34, no. 3, pp. 305–309, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. R. Madhusudhan and R. C. Mittal, “Dynamic ID-based remote user password authentication schemes using smart cards: a review,” Journal of Network and Computer Applications, vol. 35, no. 4, pp. 1235–1248, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. F. Wen and X. Li, “An improved dynamic ID-based remote user authentication with key agreement scheme,” Computers and Electrical Engineering, vol. 38, no. 2, pp. 381–387, 2012. View at Publisher · View at Google Scholar · View at Scopus